US6496949B1 - Emergency backup system, method and program product therefor - Google Patents
Emergency backup system, method and program product therefor Download PDFInfo
- Publication number
- US6496949B1 US6496949B1 US09/369,783 US36978399A US6496949B1 US 6496949 B1 US6496949 B1 US 6496949B1 US 36978399 A US36978399 A US 36978399A US 6496949 B1 US6496949 B1 US 6496949B1
- Authority
- US
- United States
- Prior art keywords
- data
- emergency
- computers
- network
- computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
- G06F11/1461—Backup scheduling policy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1456—Hardware arrangements for backup
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
- G06F11/1464—Management of the backup or restore process for networked environments
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
- G06F11/1469—Backup restoration techniques
Definitions
- the present invention is related to disaster recovery and, more particularly, to disaster recovery for computer systems and methods therefor.
- UPS emergency universal power supply
- the present invention is an emergency backup system, method and computer program product for backing up data on one or more computers located in a danger zone.
- the computers in the danger zone are connected to a backup network
- the computers may be distributed at various remote locations.
- Protected locations are locations that include a sensor for sensing an emergency situation and signaling local computers of the pending emergency. The sensor also signals remote computers of the emergency.
- the computers may have been connected together over a network or, upon receiving an emergency signal, may connect together into a backup network.
- Local computers in the danger zone arc connected across the network to remote computers that have sufficient available storage to backup data from the connected local computers.
- the backup may be a full backup, a partial backup or a selective backup.
- the computers may include PCs, PDAs and servers.
- the network may be a LAN, a wireless network, a phone network or a WAN.
- FIG. 1 shows a computer network wherein upon occurrence of an emergency condition, e.g. a fire or earthquake, computers within the zone of danger initiate backup of vulnerable data;
- an emergency condition e.g. a fire or earthquake
- FIG. 2 represents an example of the preferred database structure
- FIG. 3 is a flow diagram of the preferred embodiment emergency backup process
- FIG. 4 is another embodiment wherein, computers in the safe zone can override the receiving points defined in the emergency backup map.
- FIG. 1 shows a computer network 100 wherein upon occurrence of an emergency condition, e.g. a fire or earthquake, computers within the zone of danger initiate backup of vulnerable data.
- the network 100 may be, for example only, a local area network (LA, a wireless network, a phone network or a wide area network (WAN).
- the network 100 includes multiple connected computers 102 , 104 , 116 distributed, for example, in different rooms, 106 , 108 or in different buildings.
- the computers 102 , 104 , 116 may include, for example, one or more servers 116 and one or more personal computers 102 , 104 .
- the network 100 may also include connected hand held computers 110 , 112 such as those commonly referred to as personal digital assistants (PDAs).
- PDAs personal digital assistants
- a remote sensor 114 is located in at least one room 106 to sense and signal the occurrence of an emergency condition, e.g. a fire or earthquake.
- a server 116 may also be connected to the network 100 for additional back up resources and to maintain a disaster center database that includes disaster response models.
- a disaster response model is a model of a disaster or of a prior emergency situation paired with a preselected response for such an anticipated disaster.
- the sensor 114 Upon sensing an emergency, the sensor 114 sends a signal to vulnerable computers 102 , 110 in the danger zone, room 106 in this example. The signal is further transmitted either directly or indirectly to computers 104 , 112 and server 116 in safe areas outside of the danger zone. If the transmission is direct, the signal is transmitted to receivers in the remote computers 104 , 112 . If the transmission is indirect, then the signal is transmitted by computers 102 , 110 over the network 100 to the remote computers 104 , 112 .
- each endangered computer 102 , 110 Upon receiving the signal, each endangered computer 102 , 110 initiates a backup process, to backup data stored, for example, in files or databases in the computers 102 , 110 .
- the type of backup done in an emergency is pre-selected by the system administrator or owner. Accordingly, the backup may be, for example, a full backup wherein all data, e.g., the entire database, is backed up, a partial backup wherein only previously identified data or data changed since the last backup is backed up, or a selective backup wherein previously selected data is backed up.
- the emergency sensor 114 may be, for example, a fire detector, an earthquake detector, a water sensor, an air pressure sensor, a pressure sensor, a smell sensor, a heat detector or sensor.
- the emergency signal sent by the sensor may be an audio signal, a radio signal or, an electrical signal sent over an electrical line connected from the sensor 114 to the computer 102 . Further, if audio signal, such as a fire alarm, an earthquake alarm, a flood alarm or a volcano alarm, are employed the computers 102 , 110 are equipped to recognize the audible alarm.
- FIG. 2 shows an example of the organization of one of the intended backup computers, e.g., server 116 , which includes a classifier module 118 that generates a database 120 having the preferred structure.
- server 116 which includes a classifier module 118 that generates a database 120 having the preferred structure.
- information in the database 120 is passed to a network mapper 121 in server 116 to direct formation of an emergency backup network 100 .
- the classifier module 118 which is linked to other network databases (not shown), creates a database structure 120 that includes a priority index 122 , a change index 124 , security labeling 126 and an emergency network map 128 .
- a global backup service may employ the server 116 to provide backup coverage of multiple connected computers, e.g., 102 , 110 . Additionally, some of the computers 102 , 110 may include a local backup service.
- Each local backup service which may be included on some or all local computers or embedded devices, is structured like the service structure of FIG. 2, but provides coverage only for local data located on the same local computer, instead of providing emergency backup for all computers in the danger zone.
- emergency network map 128 points only to potential connections between the local computer and other computers that might serve as backup computers, where the locally backed up data may be sent.
- Such local emergency backup services require that the computer upon which the local service resides have sufficient memory to handle the backup and sufficient storage available to backup tie data.
- This local backup service has some advantages over a direct link to a global backup server because, during an emergency backup, network contact with an outside global backup server may be lost, which could disrupt the emergency global backup.
- a computer including such a local backup scheme is configured similar to FIG. 2 . Therefore, no additional description is required.
- the priority index 122 of database 120 has a structure that may include, for example, a list 130 of sensitive data that is most likely to be lost; unopened e-mail 132 , as well as previously opened but retained e-mail; data 134 that has been previously identified by a user for backup; and source code 136 that may be compiled to regenerate object code. Accordingly, as data is prioritized for backup queries, that prioritization reflects the importance of data and changes in data from previous backups.
- the change index 124 lists any data that has changed since an immediately prior backup that are to be backed up in any emergency backup. Thus, the change index 124 allows a system administrator or the user responsible for maintaining the emergency backup process to minimize the amount of critical data that must be handled during an emergency situation. Accordingly, for other types of backups the change index 124 may be omitted.
- the classifier module 118 creates and maintains the database structure 120 . So, periodically, the classifier module 118 checks for sensitivity marks, e.g., confidential, in preselected locations of a selected number of files maintained on the system. The marks may be located, for example, in a document header or at the end of the document. If the classifier module 118 finds such mark, it marks a file as sensitive. The classifier module also is able to identify files falling in other priority index 122 categories such as unopened e-mail and marks those files accordingly.
- sensitivity marks e.g., confidential
- the security labeling 126 allows sensitive or proprietary data to be identified and handled appropriately. If sensitive information is included, then, preferably, if time allows the sensitive data is encrypted prior to backup. Accordingly, in an emergency situation, the time required to encrypt the data is estimated and, if sufficient time is deemed available prior to the impending disaster, the sensitive data is encrypted and the encrypted data is backed up. If it is determined that sufficient time is not available, then, depending upon the data sensitivity and cost of recovery, its destruction may be allowed or, it may be transferred unencrypted. It should also be noted that, if sufficient time is available, data may be compressed to reduce emergency backup transfer time.
- the classifier module 118 may be configured to determine whether stored data contains image data as well as text. Thus, since image data is typically more voluminous than textual data and so, requires a higher transmission and storage capacity, the classifier module may assign the text a higher priority than the image data. By prioritizing the data such that the backup protects the textual data first, the likelihood of backing up all of the textual data is increased, where otherwise, the backup could be interrupted during transmission of the first image, frustrating protection even of that first image.
- the classifier module 118 may be configured to identify local backup copies that may be discarded and, so, are not transmitted. For example, word processors automatically make backup copies that need not be preserved to maintain an adequate system snapshot. Further, backup copies of graphics or image are often maintained elsewhere, automatically. Thus, the classifier module 118 , preferably, places a lower priority for backing up timed backup copies, first sending the original text or graphic files.
- Each preferred embodiment emergency network includes a database model of anticipated disasters 138 , preferably, in the backup server.
- the database model 138 receives various environmental disaster-related parameters 140 , e.g. from the sensors 114 .
- these parameters 140 may indicate the rate of expansion of the fire, general weather conditions (whether it is windy, rainy, etc.) and the size of the disaster area or of building 106 .
- an initial emergency network map 128 is included that may be based, initially, upon a prior emergency or a response to an anticipated emergency.
- the initial emergency network map 128 may be a representation of a network in four adjacent rooms 142 , 144 , 146 and 148 .
- connected computers 150 are located in rooms 142 and 144 with network connections represented by arrows.
- the network mapper upon receiving the database model 138 , environmental parameters 140 and updated sensor 114 information uses the information to modify the initial emergency network map 128 reconnecting computers 152 to form the backup network of updated emergency network map 128 ′.
- map 128 ′ arrows represent data flow within the network during an emergency backup initiated for room 142 .
- the emergency backup network may be, for example, a local area network, a telephone network, a radio network, a wireless network or a combination thereof. Further, the backup may be made over what is commonly referred to as the internet or over an intranet or an extranet.
- the emergency backup map 128 ′ may include a schedule for selecting which devices are to be connected to which channels, what the capacities of each channel should be, protocol for copying data in accordance with previously established priorities and to what devices the data should be copied. Further, the channels are created on the fly, individually, by devices in the process of communicating with other devices during the emergency.
- the protocol governing the creation of the backup channels may include device priority, relative danger of data loss, and similarity of memory capacity.
- the newly connected computers 152 may include, for example, one or more of each of what is commonly referred to as a personal computer (PC), a server, a mainframe, an embedded device or processor, a PDA, a web phone, a smart wallet, a digital pen or a digital camera.
- Small embedded devices with relatively little local memory that are connected to the network such as, for example, a smart telephone or a digital watch, depend exclusively on the global backup service from the server 116 for emergency backup.
- the server providing the global backup service may be one or more local computers located in a close proximity to embedded devices. During an emergency, data is transferred from the embedded devices to the local computer and, then, from the local computer, the data is backed up, either locally or globally across a backup network.
- the backup network is not intended to restrict the backup network to a collection of computers 152 operating normally as networked computers such as the network 100 shown in the example of FIG. 1 .
- the computers are dynamically connectable to a backup network wherein computers 152 within the danger zone 142 are connected to a computer or computers 152 outside of the danger zone 142 or in a safe zone.
- These other computers 152 may be located in locations 144 , 146 , 148 at which no emergency signals are detected, at a central remote backup server, or at a previously identified a temporary, remote backup server.
- computers having sufficient storage to store endangered data are identified outside of the danger zone 142 in a safe zone.
- FIG. 3 is a flow diagram of the preferred embodiment emergency backup process 160 .
- sensors 114 After sensing an emergency situation, sensors 114 generate emergency signals. Areas 142 within a previously identified distance from the alarms are identified as being emergency zones, with remaining areas 144 , 146 , 148 being non-emergency zones and identified as such in step 164 .
- each individual computer system 152 maintains its own map or list of connectable systems. From this map 128 the emergency back up network 128 ′ is created, dynamically.
- each system 152 also includes responses to various environmental parameters 140 and disaster types such that the system may respond appropriately based upon the type and severity of the danger.
- each device 110 or system 102 in an identified emergency location 106 attempts to establish connection with devices 112 or systems 104 in non-emergency locations 108 .
- step 168 priority is assigned according to the previously established device priority stored in the priority index 122 of the database 120 and, then, the data is transferred for backup according to that established priority.
- a preliminary estimate is made regarding the amount of data to be sent and the availability of storage at non-emergency locations.
- the time available for transfer is estimated, depending upon any available information about the characteristics of the emergency.
- data in those devices identified as being in the greatest danger are passed to devices 104 , 112 in non-emergency locations 108 first. Then, data not previously backed up or recently changed data, since the previous backup for example, are passed from devices 102 , 110 in emergency locations 106 to devices 104 , 112 in non-emergency locations 108 .
- step 170 secured data is encrypted prior to backup and in step 172 , the encrypted data is backed up.
- step 172 the emergency area is checked to determine whether the danger zone has spread.
- step 174 if the emergency has spread, devices in newly endangered locations are backed up. These new locations may include devices that had previously received backup data from other, initially endangered devices. Further, during this additional backup, these newly endangered devices also start to organize other more remote devices on the backup network or devices in a central service outside of the immediate emergency area.
- computers 180 in the safe zone 182 may override the receiving points defined in the emergency backup map 184 , electing to receive backup data from computers 186 in the danger zone 188 . Accordingly, when emergency backup network computers 180 in the safe zones 182 receive a backup request from one or more endangered computers 186 , the computers 180 in the safe zone 182 share the request and any corresponding information, e.g., the amount and type of data to be backed up as well as the severity of the emergency situation. At that point, the computer (not shown) identified in the emergency network map 184 may begin to receive the backup data or, another computer in safe zone 182 , more suited to the amount and type of data being transferred or the speed of the transfer may be substituted. As the data is transferred, it may be forwarded to a global backup server (not shown) or to some other computer on the backup network, to make space on the receiving computer in safe zone 182 , if necessary.
- a global backup server not shown
Abstract
Description
Claims (28)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/369,783 US6496949B1 (en) | 1999-08-06 | 1999-08-06 | Emergency backup system, method and program product therefor |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/369,783 US6496949B1 (en) | 1999-08-06 | 1999-08-06 | Emergency backup system, method and program product therefor |
Publications (1)
Publication Number | Publication Date |
---|---|
US6496949B1 true US6496949B1 (en) | 2002-12-17 |
Family
ID=23456900
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/369,783 Expired - Lifetime US6496949B1 (en) | 1999-08-06 | 1999-08-06 | Emergency backup system, method and program product therefor |
Country Status (1)
Country | Link |
---|---|
US (1) | US6496949B1 (en) |
Cited By (71)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020072350A1 (en) * | 2000-12-08 | 2002-06-13 | Atsushi Fukuzato | Backup method of applications of portable cellular phone |
US20020081995A1 (en) * | 2000-12-21 | 2002-06-27 | Mika Leppinen | Secure wireless backup mechanism |
US20020184239A1 (en) * | 2001-06-01 | 2002-12-05 | Malcolm Mosher | System and method for replication of distributed databases that span multiple primary nodes |
US20030023673A1 (en) * | 2001-07-05 | 2003-01-30 | Frank Tso | Auto-backup system and method for portable electronic device |
US20030037247A1 (en) * | 2000-05-23 | 2003-02-20 | Kiyohiro Obara | Computing system and data decryption method and computer system with remote copy facility |
US20030076835A1 (en) * | 2001-10-23 | 2003-04-24 | Lund Sven O. | Method and apparatus to configure a digital subscriber line device |
US20030101136A1 (en) * | 2000-08-04 | 2003-05-29 | First Data Corporation | Managing Account Database in ABDS System |
US6658374B2 (en) * | 2000-04-17 | 2003-12-02 | Sony Corporation | Maintenance support system for electronic apparatus |
US6704885B1 (en) * | 2000-07-28 | 2004-03-09 | Oracle International Corporation | Performing data backups with a stochastic scheduler in a distributed computing environment |
WO2004028066A2 (en) * | 2002-09-20 | 2004-04-01 | Tekelec | Methods and systems for locating redundant telephony call processing hosts in geographically separate locations |
US20040068386A1 (en) * | 2002-10-03 | 2004-04-08 | Smith Kevin H. | System and method for protection of active files during extreme conditions |
US20040068388A1 (en) * | 2002-10-03 | 2004-04-08 | Smith Kevin H. | System and method for protection of equipment during motion anomalies |
US20040124975A1 (en) * | 2002-12-27 | 2004-07-01 | Kabushiki Kaisha Toshiba | Electronic apparatus and data processing method |
US20040153701A1 (en) * | 2002-12-31 | 2004-08-05 | Pickell John D. | System and method for controlling redundant communication links in networked safety systems |
US20050028026A1 (en) * | 2003-07-28 | 2005-02-03 | Microsoft Corporation | Method and system for backing up and restoring data of a node in a distributed system |
US20050049732A1 (en) * | 2003-08-29 | 2005-03-03 | Dimitri Kanevsky | Method and apparatus for computer communication using audio signals |
US20050137983A1 (en) * | 2003-12-18 | 2005-06-23 | Matthew Bells | System and method for digital rights management |
US20050240595A1 (en) * | 2004-04-26 | 2005-10-27 | Sashikanth Chandrasekaran | Dynamic redistribution of a distributed memory index when individual nodes have different lookup indexes |
US20060014125A1 (en) * | 2004-07-14 | 2006-01-19 | St Clair John Q | Walking through walls training system |
US20060053177A1 (en) * | 2004-09-07 | 2006-03-09 | Riku Suomela | System and method for backup and restoration |
US20060080404A1 (en) * | 2002-06-19 | 2006-04-13 | Knut Haber-Land-Schlosser | Method and device for generating a mobile homepage in accordance with context related information |
US20060149799A1 (en) * | 2001-09-28 | 2006-07-06 | Lik Wong | Techniques for making a replica of a group of database objects |
US20060237575A1 (en) * | 2005-04-25 | 2006-10-26 | Van Hierden J E | Portable volleyball net and supports |
US20060288183A1 (en) * | 2003-10-13 | 2006-12-21 | Yoav Boaz | Apparatus and method for information recovery quality assessment in a computer system |
WO2007030553A2 (en) * | 2005-09-08 | 2007-03-15 | Interdigital Technology Corporation | Method and apparatus for processing data in a wireless communication system |
US7203861B1 (en) * | 2000-03-08 | 2007-04-10 | Cablynx, Inc. | Method and system for remotely backing up a computer memory utilizing a global communications network |
US20070098019A1 (en) * | 2003-06-25 | 2007-05-03 | Koninklijke Philips Electronics, N.V. | Automatic and selective backup system on a home network |
US20070233865A1 (en) * | 2006-03-30 | 2007-10-04 | Garbow Zachary A | Dynamically Adjusting Operating Level of Server Processing Responsive to Detection of Failure at a Server |
US20070233746A1 (en) * | 2006-03-30 | 2007-10-04 | Garbow Zachary A | Transitioning of Database Service Responsibility Responsive to Server Failure in a Partially Clustered Computing Environment |
EP1868096A1 (en) | 2006-06-14 | 2007-12-19 | Vodafone Holding GmbH | Method and system for handling persistent data, Protocol for communication between a computer and a persistent storage unit |
US20080114827A1 (en) * | 2006-11-10 | 2008-05-15 | Microsoft Corporation | Message forwarding backup manager in a distributed server system |
US20080141040A1 (en) * | 2006-12-08 | 2008-06-12 | Microsoft Corporation | Secure data protection during disasters |
US20080196044A1 (en) * | 1999-11-29 | 2008-08-14 | Stanley Randy P | Automatically enabling information to be displayed after a processor-based system is turned off |
US7447786B2 (en) | 2003-05-09 | 2008-11-04 | Oracle International Corporation | Efficient locking of shared data that is accessed for reads in a cluster database |
EP2003842A1 (en) * | 2007-06-15 | 2008-12-17 | Research In Motion Limited | A method and devices for providing secure data backup form a mobile communication device to an external computing device |
US20080310633A1 (en) * | 2007-06-15 | 2008-12-18 | Research In Motion Limited | Method and devices for providing secure data backup from a mobile communication device to an external computing device |
US20080320319A1 (en) * | 2006-12-29 | 2008-12-25 | Muller Marcus S | System and method for encrypting secondary copies of data |
US20090037442A1 (en) * | 2007-07-31 | 2009-02-05 | Jun Yuan | Reconfiguring Propagation Streams in Distributed Information Sharing |
US20090037553A1 (en) * | 2007-07-31 | 2009-02-05 | Jun Yuan | Configuring or Reconfiguring a Multi-Master Information Sharing Environment |
US7509381B1 (en) * | 2008-04-21 | 2009-03-24 | International Business Machines Corporation | Adaptive email in-basket ordering |
WO2006083329A3 (en) * | 2005-02-02 | 2009-04-23 | Carrier Corp | Refrigerating system with economizing cycle |
US20090196234A1 (en) * | 2004-05-28 | 2009-08-06 | Bae Systems Information And Electronic Systems Integration Inc. | Method And Apparatus For Persistent Communications, Interoperability And Situational Awareness In The Aftermath Of A Disaster |
DE102008047532B3 (en) * | 2008-09-16 | 2010-03-11 | Vodafone Holding Gmbh | Data selecting device for use in e.g. mobile telephone, has transfer unit transmitting data units to memory unit if sending duration is smaller than maximum duration, and selected data elements to memory unit |
US7725748B1 (en) | 2000-12-29 | 2010-05-25 | Intel Corporation | Low power subsystem for portable computers |
US7840992B1 (en) | 2006-09-28 | 2010-11-23 | Emc Corporation | System and method for environmentally aware data protection |
JP2012133746A (en) * | 2010-12-20 | 2012-07-12 | Lsi Corp | Data manipulation during memory backup |
US8341121B1 (en) * | 2007-09-28 | 2012-12-25 | Emc Corporation | Imminent failure prioritized backup |
US8345695B1 (en) | 2008-06-17 | 2013-01-01 | United Services Automobile Association (Usaa) | Systems and methods for implementing network gateway in catastrophe context or the like |
US8375005B1 (en) | 2007-03-31 | 2013-02-12 | Emc Corporation | Rapid restore |
US8463798B1 (en) | 2007-03-31 | 2013-06-11 | Emc Corporation | Prioritized restore |
US8583601B1 (en) | 2007-09-28 | 2013-11-12 | Emc Corporation | Imminent failure backup |
US20140019418A1 (en) * | 2012-07-13 | 2014-01-16 | International Business Machines Corporation | Preventing mobile communication device data loss |
FR2994291A1 (en) * | 2012-07-31 | 2014-02-07 | Jcp | Method for emergency backup of data stored on e.g. computer server, in room of e.g. administrative building, involves sending event message to additional terminal by management unit upon reception of data transfer request |
US8713376B1 (en) * | 2011-12-27 | 2014-04-29 | Symantec Corporation | Escalating data backup protection in response to a failure in a cluster of nodes |
US20140340223A1 (en) * | 2012-09-27 | 2014-11-20 | Emc Corporation | Environmental alert for computer systems |
US8924352B1 (en) | 2007-03-31 | 2014-12-30 | Emc Corporation | Automated priority backup and archive |
US20150082067A1 (en) * | 2013-09-18 | 2015-03-19 | Konica Minolta, Inc. | Information processing apparatus and power-off control method of information processing apparaus |
US9367702B2 (en) | 2013-03-12 | 2016-06-14 | Commvault Systems, Inc. | Automatic file encryption |
US9405928B2 (en) | 2014-09-17 | 2016-08-02 | Commvault Systems, Inc. | Deriving encryption rules based on file content |
US20170123671A1 (en) * | 2015-10-28 | 2017-05-04 | International Business Machines Corporation | Selective Secure Deletion of Data in Distributed Systems and Cloud |
US9785505B1 (en) * | 2014-05-12 | 2017-10-10 | Amazon Technologies, Inc. | Communicative building management system for data loss prevention |
US9793939B2 (en) | 2015-08-05 | 2017-10-17 | International Business Machines Corporation | Automatic self-protection for a portable electronic device |
US9883325B2 (en) | 2013-12-12 | 2018-01-30 | International Business Machines Corporation | Cloud based emergency wireless link |
US20190188089A1 (en) * | 2017-12-18 | 2019-06-20 | International Business Machines Corporation | Forecast recommended backup destination |
US10375116B2 (en) * | 2012-03-02 | 2019-08-06 | International Business Machines Corporation | System and method to provide server control for access to mobile client data |
US10785544B2 (en) | 2016-10-10 | 2020-09-22 | Hanwha Techwin Co., Ltd. | Image acquisition apparatus with priority network selection for data upload |
CN112714103A (en) * | 2020-12-03 | 2021-04-27 | 南京暴走团电子商务有限公司 | Safety control system based on network engineering |
WO2021087332A1 (en) * | 2019-10-30 | 2021-05-06 | Momentum Dynamics Corporation | Contactless swappable battery system |
CN113742136A (en) * | 2021-09-02 | 2021-12-03 | 瑞胜科信息(深圳)有限公司 | Safety embedded system and intelligent backup and recovery method thereof |
US11218458B2 (en) * | 2019-10-15 | 2022-01-04 | Dell Products, L.P. | Modular data center that transfers workload to mitigate a detected physical threat |
US11862987B2 (en) | 2021-12-07 | 2024-01-02 | Inductev Inc. | Contactless swappable battery system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4514729A (en) * | 1982-08-16 | 1985-04-30 | Szarka Jay R | Environmental control system and method |
US5748084A (en) * | 1996-11-18 | 1998-05-05 | Isikoff; Jeremy M. | Device security system |
US5889935A (en) * | 1996-05-28 | 1999-03-30 | Emc Corporation | Disaster control features for remote data mirroring |
US6049874A (en) * | 1996-12-03 | 2000-04-11 | Fairbanks Systems Group | System and method for backing up computer files over a wide area computer network |
US6049578A (en) * | 1997-06-06 | 2000-04-11 | Abb Combustion Engineering Nuclear Power, Inc. | Digital plant protection system |
-
1999
- 1999-08-06 US US09/369,783 patent/US6496949B1/en not_active Expired - Lifetime
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4514729A (en) * | 1982-08-16 | 1985-04-30 | Szarka Jay R | Environmental control system and method |
US5889935A (en) * | 1996-05-28 | 1999-03-30 | Emc Corporation | Disaster control features for remote data mirroring |
US5748084A (en) * | 1996-11-18 | 1998-05-05 | Isikoff; Jeremy M. | Device security system |
US6049874A (en) * | 1996-12-03 | 2000-04-11 | Fairbanks Systems Group | System and method for backing up computer files over a wide area computer network |
US6049578A (en) * | 1997-06-06 | 2000-04-11 | Abb Combustion Engineering Nuclear Power, Inc. | Digital plant protection system |
Non-Patent Citations (1)
Title |
---|
"Remote Environmental Monitor for Unattended Computer Operations". IBM Technical Disclosure Bulletin:vol. No. 32, Issue No. 9A, p. 264-266. * |
Cited By (138)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8793316B2 (en) | 1999-11-29 | 2014-07-29 | Intel Corporation | Automatically enabling information to be displayed after a processor-based system is turned off |
US20110208982A1 (en) * | 1999-11-29 | 2011-08-25 | Stanley Randy P | Automatically enabling information to be displayed after a processor-based system is turned off |
US20080196044A1 (en) * | 1999-11-29 | 2008-08-14 | Stanley Randy P | Automatically enabling information to be displayed after a processor-based system is turned off |
US10061369B2 (en) | 1999-11-29 | 2018-08-28 | Intel Corporation | Automatically enabling information to be displayed after a processor-based system is turned off |
US7203861B1 (en) * | 2000-03-08 | 2007-04-10 | Cablynx, Inc. | Method and system for remotely backing up a computer memory utilizing a global communications network |
US6658374B2 (en) * | 2000-04-17 | 2003-12-02 | Sony Corporation | Maintenance support system for electronic apparatus |
US6966001B2 (en) * | 2000-05-23 | 2005-11-15 | Hitachi, Ltd. | Computing system and data decryption method and computer system with remote copy facility |
US20030037247A1 (en) * | 2000-05-23 | 2003-02-20 | Kiyohiro Obara | Computing system and data decryption method and computer system with remote copy facility |
US6704885B1 (en) * | 2000-07-28 | 2004-03-09 | Oracle International Corporation | Performing data backups with a stochastic scheduler in a distributed computing environment |
US20030101136A1 (en) * | 2000-08-04 | 2003-05-29 | First Data Corporation | Managing Account Database in ABDS System |
US7187919B2 (en) * | 2000-12-08 | 2007-03-06 | Nec Corporation | Backup method of applications of portable cellular phone |
US20020072350A1 (en) * | 2000-12-08 | 2002-06-13 | Atsushi Fukuzato | Backup method of applications of portable cellular phone |
US6985719B2 (en) * | 2000-12-21 | 2006-01-10 | Nokia, Inc. | Secure wireless backup mechanism |
US20020081995A1 (en) * | 2000-12-21 | 2002-06-27 | Mika Leppinen | Secure wireless backup mechanism |
US7725748B1 (en) | 2000-12-29 | 2010-05-25 | Intel Corporation | Low power subsystem for portable computers |
US6785696B2 (en) * | 2001-06-01 | 2004-08-31 | Hewlett-Packard Development Company, L.P. | System and method for replication of distributed databases that span multiple primary nodes |
US20020184239A1 (en) * | 2001-06-01 | 2002-12-05 | Malcolm Mosher | System and method for replication of distributed databases that span multiple primary nodes |
US20030023673A1 (en) * | 2001-07-05 | 2003-01-30 | Frank Tso | Auto-backup system and method for portable electronic device |
US20060149799A1 (en) * | 2001-09-28 | 2006-07-06 | Lik Wong | Techniques for making a replica of a group of database objects |
US7801861B2 (en) * | 2001-09-28 | 2010-09-21 | Oracle International Corporation | Techniques for replicating groups of database objects |
US20060155789A1 (en) * | 2001-09-28 | 2006-07-13 | Lik Wong | Techniques for replicating groups of database objects |
US20030076835A1 (en) * | 2001-10-23 | 2003-04-24 | Lund Sven O. | Method and apparatus to configure a digital subscriber line device |
US20060080404A1 (en) * | 2002-06-19 | 2006-04-13 | Knut Haber-Land-Schlosser | Method and device for generating a mobile homepage in accordance with context related information |
WO2004028066A2 (en) * | 2002-09-20 | 2004-04-01 | Tekelec | Methods and systems for locating redundant telephony call processing hosts in geographically separate locations |
US8213299B2 (en) | 2002-09-20 | 2012-07-03 | Genband Us Llc | Methods and systems for locating redundant telephony call processing hosts in geographically separate locations |
US20040114578A1 (en) * | 2002-09-20 | 2004-06-17 | Tekelec | Methods and systems for locating redundant telephony call processing hosts in geographically separate locations |
WO2004028066A3 (en) * | 2002-09-20 | 2004-04-29 | Tekelec Us | Methods and systems for locating redundant telephony call processing hosts in geographically separate locations |
US6925409B2 (en) * | 2002-10-03 | 2005-08-02 | Hewlett-Packard Development Company, L.P. | System and method for protection of active files during extreme conditions |
US6879931B2 (en) * | 2002-10-03 | 2005-04-12 | Hewlett-Packard Development Company, L.P. | System and method for protection of equipment during motion anomalies |
US20040068388A1 (en) * | 2002-10-03 | 2004-04-08 | Smith Kevin H. | System and method for protection of equipment during motion anomalies |
US20040068386A1 (en) * | 2002-10-03 | 2004-04-08 | Smith Kevin H. | System and method for protection of active files during extreme conditions |
US20040124975A1 (en) * | 2002-12-27 | 2004-07-01 | Kabushiki Kaisha Toshiba | Electronic apparatus and data processing method |
US20040153701A1 (en) * | 2002-12-31 | 2004-08-05 | Pickell John D. | System and method for controlling redundant communication links in networked safety systems |
US7222256B2 (en) * | 2002-12-31 | 2007-05-22 | Honeywell International Inc. | System and method for controlling redundant communication links in networked safety systems |
US7447786B2 (en) | 2003-05-09 | 2008-11-04 | Oracle International Corporation | Efficient locking of shared data that is accessed for reads in a cluster database |
US20070098019A1 (en) * | 2003-06-25 | 2007-05-03 | Koninklijke Philips Electronics, N.V. | Automatic and selective backup system on a home network |
US20050028026A1 (en) * | 2003-07-28 | 2005-02-03 | Microsoft Corporation | Method and system for backing up and restoring data of a node in a distributed system |
US7249281B2 (en) * | 2003-07-28 | 2007-07-24 | Microsoft Corporation | Method and system for backing up and restoring data of a node in a distributed system |
US20090315687A1 (en) * | 2003-08-29 | 2009-12-24 | Dimitri Kanevsky | Method and apparatus for computer communication using audio signals |
US20050049732A1 (en) * | 2003-08-29 | 2005-03-03 | Dimitri Kanevsky | Method and apparatus for computer communication using audio signals |
US8054986B2 (en) * | 2003-08-29 | 2011-11-08 | International Business Machines Corporation | Method and apparatus for computer communication using audio signals |
US7706548B2 (en) * | 2003-08-29 | 2010-04-27 | International Business Machines Corporation | Method and apparatus for computer communication using audio signals |
US8244792B2 (en) | 2003-10-13 | 2012-08-14 | Emc (Benelux) B.V., S.A.R.L. | Apparatus and method for information recovery quality assessment in a computer system |
US20060288183A1 (en) * | 2003-10-13 | 2006-12-21 | Yoav Boaz | Apparatus and method for information recovery quality assessment in a computer system |
US20050137983A1 (en) * | 2003-12-18 | 2005-06-23 | Matthew Bells | System and method for digital rights management |
US20050240595A1 (en) * | 2004-04-26 | 2005-10-27 | Sashikanth Chandrasekaran | Dynamic redistribution of a distributed memory index when individual nodes have different lookup indexes |
US7962453B2 (en) | 2004-04-26 | 2011-06-14 | Oracle International Corporation | Dynamic redistribution of a distributed memory index when individual nodes have different lookup indexes |
US9426834B2 (en) | 2004-05-28 | 2016-08-23 | Bae Systems Information And Electronic Systems Integration Inc. | Method and apparatus for persistent communications, interoperability and situational awareness in the aftermath of a disaster |
US9125041B2 (en) | 2004-05-28 | 2015-09-01 | Bae Systems Information And Electronic Systems Integration Inc. | Method and apparatus for persistent communications, interoperability and situational awareness in the aftermath of a disaster |
US8681804B2 (en) * | 2004-05-28 | 2014-03-25 | Bae Systems Information And Electronic Systems Integration Inc. | Method and apparatus for persistent communications, interoperability and situational awareness in the aftermath of a disaster |
US20090196234A1 (en) * | 2004-05-28 | 2009-08-06 | Bae Systems Information And Electronic Systems Integration Inc. | Method And Apparatus For Persistent Communications, Interoperability And Situational Awareness In The Aftermath Of A Disaster |
US20060014125A1 (en) * | 2004-07-14 | 2006-01-19 | St Clair John Q | Walking through walls training system |
WO2006027653A1 (en) | 2004-09-07 | 2006-03-16 | Nokia Corporation | System and method for backup and restoration |
US20060053177A1 (en) * | 2004-09-07 | 2006-03-09 | Riku Suomela | System and method for backup and restoration |
US20140053002A1 (en) * | 2004-11-15 | 2014-02-20 | Commvault Systems, Inc. | System and method for encrypting secondary copies of data |
US9411986B2 (en) * | 2004-11-15 | 2016-08-09 | Commvault Systems, Inc. | System and method for encrypting secondary copies of data |
US9633232B2 (en) | 2004-11-15 | 2017-04-25 | Commvault Systems, Inc. | System and method for encrypting secondary copies of data |
WO2006083329A3 (en) * | 2005-02-02 | 2009-04-23 | Carrier Corp | Refrigerating system with economizing cycle |
AU2005326782C1 (en) * | 2005-02-02 | 2011-06-09 | Carrier Corporation | Refrigerating system with economizing cycle |
AU2005326782B2 (en) * | 2005-02-02 | 2010-11-11 | Carrier Corporation | Refrigerating system with economizing cycle |
US20060237575A1 (en) * | 2005-04-25 | 2006-10-26 | Van Hierden J E | Portable volleyball net and supports |
WO2007030553A3 (en) * | 2005-09-08 | 2007-09-13 | Interdigital Tech Corp | Method and apparatus for processing data in a wireless communication system |
US20070192585A1 (en) * | 2005-09-08 | 2007-08-16 | Interdigital Technology Corporation | Method and apparatus for processing data in a wireless communication system |
WO2007030553A2 (en) * | 2005-09-08 | 2007-03-15 | Interdigital Technology Corporation | Method and apparatus for processing data in a wireless communication system |
US8069139B2 (en) | 2006-03-30 | 2011-11-29 | International Business Machines Corporation | Transitioning of database service responsibility responsive to server failure in a partially clustered computing environment |
US20070233865A1 (en) * | 2006-03-30 | 2007-10-04 | Garbow Zachary A | Dynamically Adjusting Operating Level of Server Processing Responsive to Detection of Failure at a Server |
US20070233746A1 (en) * | 2006-03-30 | 2007-10-04 | Garbow Zachary A | Transitioning of Database Service Responsibility Responsive to Server Failure in a Partially Clustered Computing Environment |
US7496579B2 (en) * | 2006-03-30 | 2009-02-24 | International Business Machines Corporation | Transitioning of database service responsibility responsive to server failure in a partially clustered computing environment |
US20090119306A1 (en) * | 2006-03-30 | 2009-05-07 | International Business Machines Corporation | Transitioning of database srvice responsibility responsive to server failure in a partially clustered computing environment |
EP1868096A1 (en) | 2006-06-14 | 2007-12-19 | Vodafone Holding GmbH | Method and system for handling persistent data, Protocol for communication between a computer and a persistent storage unit |
US7840992B1 (en) | 2006-09-28 | 2010-11-23 | Emc Corporation | System and method for environmentally aware data protection |
US20080114827A1 (en) * | 2006-11-10 | 2008-05-15 | Microsoft Corporation | Message forwarding backup manager in a distributed server system |
US7685227B2 (en) | 2006-11-10 | 2010-03-23 | Gerber Robert H | Message forwarding backup manager in a distributed server system |
WO2008057649A1 (en) * | 2006-11-10 | 2008-05-15 | Microsoft Corporation | Message forwarding backup manager in a distributed server system |
US20080141040A1 (en) * | 2006-12-08 | 2008-06-12 | Microsoft Corporation | Secure data protection during disasters |
US8135135B2 (en) | 2006-12-08 | 2012-03-13 | Microsoft Corporation | Secure data protection during disasters |
US20080320319A1 (en) * | 2006-12-29 | 2008-12-25 | Muller Marcus S | System and method for encrypting secondary copies of data |
US20100031017A1 (en) * | 2006-12-29 | 2010-02-04 | Parag Gokhale | System and method for encrypting secondary copies of data |
US8510573B2 (en) * | 2006-12-29 | 2013-08-13 | Commvault Systems, Inc. | System and method for encrypting secondary copies of data |
US8775823B2 (en) | 2006-12-29 | 2014-07-08 | Commvault Systems, Inc. | System and method for encrypting secondary copies of data |
US8463798B1 (en) | 2007-03-31 | 2013-06-11 | Emc Corporation | Prioritized restore |
US8924352B1 (en) | 2007-03-31 | 2014-12-30 | Emc Corporation | Automated priority backup and archive |
US8375005B1 (en) | 2007-03-31 | 2013-02-12 | Emc Corporation | Rapid restore |
US9053330B2 (en) | 2007-06-15 | 2015-06-09 | Blackberry Limited | Method and devices for providing secure data backup from a mobile communication device to an external computing device |
US8484464B2 (en) | 2007-06-15 | 2013-07-09 | Research In Motion Limited | Method and devices for providing secure data backup from a mobile communication device to an external computing device |
US20080310633A1 (en) * | 2007-06-15 | 2008-12-18 | Research In Motion Limited | Method and devices for providing secure data backup from a mobile communication device to an external computing device |
US9594916B2 (en) | 2007-06-15 | 2017-03-14 | Blackberry Limited | Method and devices for providing secure data backup from a mobile communication device to an external computing device |
EP2003842A1 (en) * | 2007-06-15 | 2008-12-17 | Research In Motion Limited | A method and devices for providing secure data backup form a mobile communication device to an external computing device |
US7899785B2 (en) | 2007-07-31 | 2011-03-01 | Oracle International Corporation | Reconfiguring propagation streams in distributed information sharing |
US20090037553A1 (en) * | 2007-07-31 | 2009-02-05 | Jun Yuan | Configuring or Reconfiguring a Multi-Master Information Sharing Environment |
US20090037442A1 (en) * | 2007-07-31 | 2009-02-05 | Jun Yuan | Reconfiguring Propagation Streams in Distributed Information Sharing |
US7702741B2 (en) | 2007-07-31 | 2010-04-20 | Oracle International Corporation | Configuring or reconfiguring a multi-master information sharing environment |
US8583601B1 (en) | 2007-09-28 | 2013-11-12 | Emc Corporation | Imminent failure backup |
US8341121B1 (en) * | 2007-09-28 | 2012-12-25 | Emc Corporation | Imminent failure prioritized backup |
US7509381B1 (en) * | 2008-04-21 | 2009-03-24 | International Business Machines Corporation | Adaptive email in-basket ordering |
US8345695B1 (en) | 2008-06-17 | 2013-01-01 | United Services Automobile Association (Usaa) | Systems and methods for implementing network gateway in catastrophe context or the like |
US8934497B1 (en) | 2008-06-17 | 2015-01-13 | United Services Automobile Association | Systems and methods for implementing network gateway in catastrophe context or the like |
US10257235B1 (en) | 2008-06-17 | 2019-04-09 | United Services Automobile Association (Usaa) | Systems and methods for implementing network gateway in catastrophe context or the like |
EP2196907A3 (en) * | 2008-09-16 | 2012-05-23 | Vodafone Holding GmbH | Device for selecting data for storage |
DE102008047532B3 (en) * | 2008-09-16 | 2010-03-11 | Vodafone Holding Gmbh | Data selecting device for use in e.g. mobile telephone, has transfer unit transmitting data units to memory unit if sending duration is smaller than maximum duration, and selected data elements to memory unit |
JP2012133746A (en) * | 2010-12-20 | 2012-07-12 | Lsi Corp | Data manipulation during memory backup |
US8713376B1 (en) * | 2011-12-27 | 2014-04-29 | Symantec Corporation | Escalating data backup protection in response to a failure in a cluster of nodes |
US10375116B2 (en) * | 2012-03-02 | 2019-08-06 | International Business Machines Corporation | System and method to provide server control for access to mobile client data |
US20140019418A1 (en) * | 2012-07-13 | 2014-01-16 | International Business Machines Corporation | Preventing mobile communication device data loss |
US10085140B2 (en) * | 2012-07-13 | 2018-09-25 | International Business Machines Corporation | Preventing mobile communication device data loss |
FR2994291A1 (en) * | 2012-07-31 | 2014-02-07 | Jcp | Method for emergency backup of data stored on e.g. computer server, in room of e.g. administrative building, involves sending event message to additional terminal by management unit upon reception of data transfer request |
US20140340223A1 (en) * | 2012-09-27 | 2014-11-20 | Emc Corporation | Environmental alert for computer systems |
US9153122B2 (en) * | 2012-09-27 | 2015-10-06 | Emc Corporation | Environmental alert for computer systems |
US11928229B2 (en) | 2013-03-12 | 2024-03-12 | Commvault Systems, Inc. | Automatic file encryption |
US11042663B2 (en) | 2013-03-12 | 2021-06-22 | Commvault Systems, Inc. | Automatic file encryption |
US10445518B2 (en) | 2013-03-12 | 2019-10-15 | Commvault Systems, Inc. | Automatic file encryption |
US9734348B2 (en) | 2013-03-12 | 2017-08-15 | Commvault Systems, Inc. | Automatic file encryption |
US9367702B2 (en) | 2013-03-12 | 2016-06-14 | Commvault Systems, Inc. | Automatic file encryption |
US9483655B2 (en) | 2013-03-12 | 2016-11-01 | Commvault Systems, Inc. | File backup with selective encryption |
US9990512B2 (en) | 2013-03-12 | 2018-06-05 | Commvault Systems, Inc. | File backup with selective encryption |
US20150082067A1 (en) * | 2013-09-18 | 2015-03-19 | Konica Minolta, Inc. | Information processing apparatus and power-off control method of information processing apparaus |
US9886078B2 (en) * | 2013-09-18 | 2018-02-06 | Konica Minolta, Inc. | Information processing apparatus and power-off control method of information processing apparaus |
US9883325B2 (en) | 2013-12-12 | 2018-01-30 | International Business Machines Corporation | Cloud based emergency wireless link |
US9888338B2 (en) | 2013-12-12 | 2018-02-06 | International Business Machines Corporation | Cloud based emergency wireless link |
US9785505B1 (en) * | 2014-05-12 | 2017-10-10 | Amazon Technologies, Inc. | Communicative building management system for data loss prevention |
US9727491B2 (en) | 2014-09-17 | 2017-08-08 | Commvault Systems, Inc. | Token-based encryption determination process |
US9720849B2 (en) | 2014-09-17 | 2017-08-01 | Commvault Systems, Inc. | Token-based encryption rule generation process |
US9984006B2 (en) | 2014-09-17 | 2018-05-29 | Commvault Systems, Inc. | Data storage systems and methods |
US9405928B2 (en) | 2014-09-17 | 2016-08-02 | Commvault Systems, Inc. | Deriving encryption rules based on file content |
US10833718B2 (en) | 2015-08-05 | 2020-11-10 | International Business Machines Corporation | Automatic self-protection for a portable electronic device |
US9793939B2 (en) | 2015-08-05 | 2017-10-17 | International Business Machines Corporation | Automatic self-protection for a portable electronic device |
US20170123671A1 (en) * | 2015-10-28 | 2017-05-04 | International Business Machines Corporation | Selective Secure Deletion of Data in Distributed Systems and Cloud |
US10671325B2 (en) * | 2015-10-28 | 2020-06-02 | International Business Machines Corporation | Selective secure deletion of data in distributed systems and cloud |
US10785544B2 (en) | 2016-10-10 | 2020-09-22 | Hanwha Techwin Co., Ltd. | Image acquisition apparatus with priority network selection for data upload |
US20190188089A1 (en) * | 2017-12-18 | 2019-06-20 | International Business Machines Corporation | Forecast recommended backup destination |
US10671492B2 (en) * | 2017-12-18 | 2020-06-02 | International Business Machines Corporation | Forecast recommended backup destination |
US11218458B2 (en) * | 2019-10-15 | 2022-01-04 | Dell Products, L.P. | Modular data center that transfers workload to mitigate a detected physical threat |
WO2021087332A1 (en) * | 2019-10-30 | 2021-05-06 | Momentum Dynamics Corporation | Contactless swappable battery system |
US11689061B2 (en) | 2019-10-30 | 2023-06-27 | Inductev Inc. | Contactless swappable battery system |
CN112714103A (en) * | 2020-12-03 | 2021-04-27 | 南京暴走团电子商务有限公司 | Safety control system based on network engineering |
CN113742136A (en) * | 2021-09-02 | 2021-12-03 | 瑞胜科信息(深圳)有限公司 | Safety embedded system and intelligent backup and recovery method thereof |
CN113742136B (en) * | 2021-09-02 | 2022-05-17 | 瑞胜科信息(深圳)有限公司 | Intelligent backup and recovery method based on safe embedded system |
US11862987B2 (en) | 2021-12-07 | 2024-01-02 | Inductev Inc. | Contactless swappable battery system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6496949B1 (en) | Emergency backup system, method and program product therefor | |
US5748084A (en) | Device security system | |
US20070038680A1 (en) | Management of mobile-device data | |
US8012219B2 (en) | System and method for preventing access to data on a compromised remote device | |
RU2384878C2 (en) | System for backing-up data from remote locations | |
TWI317477B (en) | Detection of out of memory and graceful shutdown | |
CN103930879A (en) | Shadowing storage gateway | |
CN109828951B (en) | Method and system for storing snapshot by combining Kubernetes and Ceph | |
WO1991014230A1 (en) | Message communication processing system | |
WO2002050716A1 (en) | Restoration of data between primary and backup systems | |
US20040143657A1 (en) | Method for remote data management | |
US20070174692A1 (en) | Image processing apparatus including function of backing up data by storing data in another device, backup program executed in image processing apparatus, and backup method | |
WO2017045295A1 (en) | Security state identifying and alarming method and system for intelligent terminal, and intelligent terminal | |
US11288378B2 (en) | Embedded data protection and forensics for physically unsecure remote terminal unit (RTU) | |
WO2007009844A1 (en) | Maintaining and using information on updates to a data group after a logical copy is made of the data group | |
CN102687135B (en) | Data are recovered in the storage medium of the electronic equipment be tampered | |
JP6744545B2 (en) | Information processing apparatus, information processing program, and information processing system | |
JP2008139996A (en) | Information leakage prevention system and data storage method | |
JPH10133971A (en) | File transfer processing system | |
US7805563B2 (en) | Tape drive apparatus | |
US6516423B1 (en) | System and method for providing multiple queue redundancy in a distributed computing system | |
JP2006285446A (en) | Computer system and its client computer | |
US7631056B2 (en) | Communication server switching controller | |
CN100445982C (en) | Computer restoration system and method with multiple restoring points | |
JP3928006B2 (en) | Customer information management system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KANEVSKY, DIMITRI;ZADROZNY, WLODEK;ZLATSIN, ALEXANDER;REEL/FRAME:010159/0103;SIGNING DATES FROM 19990805 TO 19990806 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
CC | Certificate of correction | ||
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
REMI | Maintenance fee reminder mailed | ||
FPAY | Fee payment |
Year of fee payment: 12 |
|
SULP | Surcharge for late payment |
Year of fee payment: 11 |